asthma 发表于 2025-3-27 00:20:44

The Search for the Holy Grail in Quantum Cryptography,ic principles of quantum mechanics. The scheme allows two parties, Alice and Bob, sharing no secret information in the first place, to exchange messages that nobody else can figure out. The only requirement is a quantum channel and a normal phone line connecting the two parties. The fact that quantu

商店街 发表于 2025-3-27 02:53:38

Unconditional Security in Cryptography,earch for schemes with unconditional security. The corresponding proofs however must be based on information theory rather than complexity theory. One reason for this is the lack of known lower bounds on the running time of algorithms solving certain computational problems such as the discrete-logar

Diaphragm 发表于 2025-3-27 07:28:55

http://reply.papertrans.cn/59/5835/583494/583494_33.png

Commentary 发表于 2025-3-27 13:15:02

Lectures on Data Security978-3-540-48969-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

ETCH 发表于 2025-3-27 17:11:05

0302-9743 Overview: Up-to-date survey of the state of the art in modern cryptology.Includes supplementary material: 978-3-540-65757-6978-3-540-48969-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

colony 发表于 2025-3-27 17:49:51

https://doi.org/10.1007/3-540-48969-XStandards; Zero-Knowledge; cryptoanalysis; cryptography; cryptology; data security; digital payment system

共同给与 发表于 2025-3-28 00:16:13

http://reply.papertrans.cn/59/5835/583494/583494_37.png

Thyroxine 发表于 2025-3-28 05:32:55

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/l/image/583494.jpg

无思维能力 发表于 2025-3-28 08:36:43

Emerging Standards for Public-Key Cryptography, specified. Public-key cryptography, now in its third decade, is in the midst of such a transition. With an introduction to the P1363 project ., this survey highlights some of the transitional challenges, and also describes several areas for further research motivated by the standards efforts.

钻孔 发表于 2025-3-28 14:07:45

Commitment Schemes and Zero-Knowledge Protocols,This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them.
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Lectures on Data Security; Modern Cryptology in Ivan Bjerre Damgård Textbook 1999 Springer-Verlag Berlin Heidelberg 1999 Standards.Zero-Kno